click below
click below
Normal Size Small Size show me how
Data An Exam 3
Question | Answer |
---|---|
Accessibility | Refers to who has access to the information systems and the data that they hold |
Accuracy | When data are what they are supposed to be and do not include errors |
Clickstream Data | Tracking of online browsing behaviors |
Cookie Manager | A software application that allows you to view which cookies are stored on your computer and what is in them and gives you the ability to delete them |
Cookies | Small text files located on your computer to store information about you, your accounts, and your computer |
Data Collection Threat | A privacy threat resulting from the fact that data can be collected, aggregated, and analyzed at a faster pace and in larger volumes than ever, without individuals’ awareness |
Errors in Data | A privacy threat where there are inaccuracies in data. |
Identity Theft | Using another person’s personal information for fraudulent activities. |
Improper Access to Data | A privacy threat where unauthorized individuals have access to one’s private information. |
Opt In | A privacy option where individuals state they agree that their data can be shared with others or used for other purposes, often to receive special deals or information from partner companies. |
Opt Out | A privacy option where individuals must state that they do not want their data to be shared with others or used for other purposes. |
Privacy | One’s ability to control information about oneself |
Privacy Policy | A statement that describes what the organization’s practices are with respect to the privacy of its customers. |
Privacy Seal | A seal that a business can post on its website to show its commitment to privacy. |
Property | Refers to who has ownership of the data. |
Reputation Seal | A seal that a business can post on its website to show its commitment to trustworthiness |
Seal Program | A program offered by an organization that posts a set of rules that companies must follow to be a part of the seal program. |
Security Seal | A seal that a business can post on its website to show its commitment to security. |
Unauthorized Secondary Use of Information | A privacy threat resulting from the use of data for purposes other than those for which they were originally collected. |
Business Intelligence | A set of applications, technologies, and processes for gathering, storing, analyzing, and accessing data to help users make better business decisions |
Customer Issues Management | Applications that help organizations with tasks such as scheduling, dispatching, and communicating with field service personnel |
Customer Profiling | Applications that help organizations group customers according to demographic characteristics or behaviors. |
Customer Self-Service | Software that allows customers to find solutions to problems without interacting with a customer service representative. |
Data Integration | Applications where data are stored in one central database. |
Data Mining | The process of analyzing data to identify trends, patterns, and other useful information to make predictions. |
Enterprise Systems | Information systems that serve the needs of the organization or parts of the organization |
Order Tracking | Applications that allow customers to determine the status of their order. |
Personal Information Systems | Information systems applications for individual use. |
Radio-Frequency Identification Tags | Electronic tags that can be tracked remotely using wireless networks |
Supply Chain | Entities involved in the flow of goods from the manufacturer to the wholesaler to the retailer and to the consumer. |
Systems Integration | The unification of information systems and databases that previously operated as separate systems |
Codifying Knowledge | Converting tacit and explicit knowledge into a form that organizational members can use |
Cognitive Map | A graphical representation of a mental model of an expert’s knowledge |
Community of Practice | A group of people who share a common interest, usually in a craft or profession, and who interact to share knowledge. |
Conceptual Knowledge | Explicit knowledge that is embodied in language, symbols, and images |
Data Warehouse | A copy of transactional data (and other data) that is formatted so that it is useful for decision support |
Decision Table | A list of conditions and their values along with a list of conclusions or actions. |
Decision Tree | A diagram that shows alternate paths that impact decisions. |
Digital Dashboards | Computer-based systems that provide graphical views of key data along with graphical warnings when data indicate areas that need attention |
Experiential Knowledge | Tacit knowledge that can be shared through common experiences and interpersonal communication. |
Expert Systems | Systems that help users solve problems or answer questions in a way that mimics an expert’s thought processes. |
Explicit Knowledge | Knowledge that can be expressed relatively easily. |
Routine Knowledge | Tacit knowledge that is embedded in the organization’s practices. |
Systemic Knowledge | Explicit knowledge that has been systemized and packaged. |
Tacit Knowledge | Internalized and highly individualized knowledge that is difficult to express or communicate. |
Can GROUP BY utilize aliases? | No, it must be an actual column that is identified in the SELECT statement, not an alias |
Which SQL clause is similar to the WHERE clause but allows users to filter based on grouped values? | HAVING |
Which SQL clause would we have to use if we wanted to find a count of how many products were included in each order? | GROUP BY |
Which of the following SQL aggregate functions will add together all of a column's values? | SUM |
Which of the following SQL aggregate functions will return a column's smallest value? | MIN |
Which of the following SQL aggregate functions will return a column's largest value? | MAX |
Which of the following SQL aggregate functions will return the number of rows in a column? | COUNT |
Which of the following SQL aggregate functions will return a column's average value? | AVG |
Which of the following functions will convert a string to have all capital letters? | UPPER |
Which of the following functions will trim white space from the left of a string? | LTRIM |
Which of the following functions will convert a string to lowercase? | LOWER |
Which type of functions are used to manipulate date and time values and to extract specific components from these values (for example, returning the differences between dates and checking date validity)? | Date and Time Functions |
Which type of functions are used to perform mathematical operations on numeric data (for example, returning absolute values of numbers and performing algebraic calculations)? | Numeric Functions |
Which type of functions are used to manipulate strings of text (for example, trimming or padding values and converting values to uppercase and lowercase)? | Text Functions |
Which of the following types of functions were introduced in Lesson 8 of the SQL book? | Text, Date and Time, and Numeric (All of the Above) |
Queries that are embedded into other queries are called? | Subqueries |
Which type of join is created by listing multiple tables in the FROM clause separated by commas? | Equijoin |
Which type of join is equivalent of an equijoin? | Inner Join |
What do we need to do if we have columns with the same name in both of the tables that are being joined together? | Fully Qualify Column Names using a TABLE.COLUMN syntax |
True or false, can tables be aliased? | True |